Tuesday, September 2, 2014

Glenn Greenwald, the main party Snowden revelations behind porukkansa has been busy with summer and


How does the year 2013 shows the information security? What are the new threats and how old threats to hedge against? 1 malware more intelligence
Cyber-criminals will see more and more effort (time, money, expertise) to produce advanced malware. A good example of this is found in Germany, the banking trojan that is staying with the user, as well as PC-to-device linen paper and smartphone. In this case, a very convincing appreciable phone verifications can also be captured.
Cryptpme.org-service to the public has been released 2227 pages of the expected linen paper 58 000 files. The New York Times, the other two still missing parts, including the total is estimated at up to 250 000 documents. Although the revelations of publication rate has clearly subsided, the summer was released two interesting news Snowden based on the documents, linen paper and the third as yet unidentified body from leaking out of the whole.
Glenn Greenwald, the main party Snowden revelations behind porukkansa has been busy with summer and also published other interesting and topical articles beginning of the year based on its Intercept linen paper The news service.
ICREACH already in 2000 in the early start put information system project, which includes The Intercept According to an article over 850 billion about 23 different public authority use. The service can be used for profiling individuals and linking; information based on location information, voice, express and e-mail messages that have been collected signal intelligence.
In December last year the public decided to use the NSA's TAO-unit tool selection for presenting the document is one of the most important Snowden-revelations that the UK GCHQ's a similar list of the tools they use are no longer quite as shocking. The nine different categories divided Wiki site contains more than a hundred different linen paper technique, tool or database. As ANT-toolbox, tools used in the naming of the imagination, and any tietoverkkorikollisorganisaatio can only drool and get a kick out of the scope of the instruments and the versatility of admiring.
Tracer fire - An Office Document That grabs the targets Machine info, files, logs, etc and posts it back to GCHG - one could imagine that this is used for zero-day vulnerabilities to help
Gestator - Given amplification of a message, Normally the video, is a popular multimedia websites (Youtube) - every wannabe celebrity wish tool - what this may be?
Published document explains that the site is not updated anymore, and the latest updates are for the year 2012, these, as previously mentioned, the ANT-tools are, therefore, linen paper already outdated, partly discharged from the equipment, have been replaced by new, more sophisticated tools. Moore's Law also applies to the development of these tools, we see only a small piece of outdated tools.
Another interesting public decided to use the database indicates that the signal intelligence is also used for its original purpose, ie counter-terrorism work. A leaked document from August 2013 to show how the different ways the system has been gathered about 680 000 people and information "Terrorist Screening Database" database. The published details explains how a listing linen paper decided to use a person belongs to a known terrorist organization, but outside of those belonging to the amount of 280 000 is a surprisingly big. Around a million people, containing the information the TIDE system (Terrorist Identities Data Mart Environment) is used much wider use by the authorities. According linen paper to reports of these individuals have been gathered from a surprising number of the biometric data; fingerprints of about quarter of a million people, more than half a million face image, as well as about 70 000 in the second eye detection linen paper enabling the iris image.
However, what this news is particularly troubling, linen paper is the identification of new means of fast breeder

No comments:

Post a Comment